RTMify ASPICE Quick Start Guide
Complete walkthrough of filling in the RTMify template for ASPICE (Automotive SPICE), the process assessment model used by automotive OEMs to audit Tier 1 and Tier 2 supplier software development capabilities.
About This Guide
This guide walks you through filling in the RTMify template for ASPICE (Automotive SPICE), an ISO/IEC 33002-based process assessment model used by automotive Original Equipment Manufacturers (OEMs) to audit Tier 1 and Tier 2 suppliers' software development processes. ASPICE defines a Capability Level (CL) scale from CL1 (initial/ad-hoc) to CL5 (optimizing), with most OEM supplier agreements requiring CL2 minimum and CL3 for safety-critical software.
ASPICE assesses how well your organization performs specific process elements: SYS.1 (stakeholder requirements elicitation), SYS.2 (system requirements definition), SWE.1 (software requirements derivation), SWE.2–3 (architecture and detailed design), SWE.4–6 (unit/integration/qualification verification), and generic practices like GP 2.1.7 (bidirectional traceability) and GP 2.1.1 (work product management and approval). The template demonstrates base practices (BP) and generic practices (GP) through structured documentation of requirements, tests, and traceability.
For ASPICE workbooks, run RTMify Trace with the automotive profile. That turns on the automotive-specific chain checks behind SYS.1 → SYS.2 → SWE.1 allocation, configuration-item coverage, and other automotive workflow gaps while keeping the generic traceability checks intact.
By the end of this guide, you'll have a complete requirements traceability matrix (RTM) linking stakeholder requirements (SYS.1) through system requirements (SYS.2), software requirements (SWE.1), verification activities (SWE.4–6), and risk mitigations. This RTM is key evidence in your ASPICE assessment and demonstrates compliance with capability level requirements for OEM audit readiness.
What ASPICE Requires
SYS.1 — Stakeholder Requirements Elicitation
ASPICE SYS.1 base practices require systematic elicitation of requirements from all stakeholders: OEM specification documents (Lastenheft), regulatory standards (ISO 21434, ISO 26262 if applicable), market demands, and industry best practices. Requirements sources include:
- OEM Specifications (Lastenheft) — Customer requirements documents defining expected functionality, performance, interfaces
- Regulatory Standards — Cybersecurity (ISO 21434), functional safety (ISO 26262), emissions, legal compliance
- Market & Industry Standards — Industry best practices, competitor analysis, emerging technologies
- System Constraints — Hardware limitations, platform constraints, integration interfaces
Record stakeholder requirements as User Needs (UN) in RTMify. Each UN must be traceable to a source (OEM spec, regulation, standard), assigned a priority, and linked forward to system requirements (SYS.2). Base practice BP 1.1 (stakeholder requirements elicitation) is demonstrated by a complete, sourced UN list.
SYS.2 — System Requirements Definition
SYS.2 requires deriving system requirements from stakeholder needs and allocating them to software (SWE), hardware, and mechanical subsystems. System requirements are measurable, testable specifications defining what the system (hardware + software) must accomplish; e.g., "The BCM SHALL authenticate keyless entry fob within 200ms at ≤ 2m range using 125kHz/UHF challenge-response" is a system requirement allocating both RF transceiver (hardware) and authentication logic (software) responsibilities. Base practice BP 1.2 (system requirement definition) requires:
- Traceability upward — Every SYS requirement traces to at least one stakeholder requirement (UN)
- Allocation downward — SYS requirements are allocated to SW (SWE) and hardware modules
- Testability — Requirements are measurable with clear acceptance criteria
- Completeness — All stakeholder needs are addressed by at least one SYS requirement
In RTMify, use ID format SYS-nnn for system requirements, trace them to User Needs (UN), and establish forward traceability to SWE requirements.
SWE.1 — Software Requirements Derivation
SWE.1 requires deriving software-specific requirements from system requirements and documenting software architectural decisions. Software requirements specify what the software must do to satisfy system requirements; e.g., SYS-001 (authenticate keyless entry) allocates to SWE-001 (software authentication protocol) and potentially SWE-002 (RF driver module). SWE.1 base practice BP 1.1 requires:
- Derivation from SYS requirements — Every SWE requirement traces to a parent SYS requirement
- Architectural allocation — SWE requirements identify which software module implements them (SWE-001 in "Authentication Module", SWE-002 in "RF Driver Module")
- Design rationale — Document why each SWE requirement is necessary to satisfy the parent SYS requirement
- Testability — SWE requirements include measurable acceptance criteria for unit and integration testing
In RTMify, use ID format SWE-nnn for software requirements, trace them to parent SYS requirements, and include notes on architectural allocation (e.g., "SWE-001 | Authentication Module | SWE.1 software requirement").
SWE.2 & SWE.3 — Software Architecture and Detailed Design
SWE.2 (software architecture design) and SWE.3 (software detailed design and unit construction) are assessed through design documentation, module interfaces, and design reviews. While RTMify focuses on requirements and verification, design artifacts (architecture diagrams, module specifications, design review records) are maintained separately and referenced via links in requirement Notes. SWE.2/3 base practices require design review evidence (BP 2.1 design review).
SWE.4, SWE.5, SWE.6 — Software Verification (Unit, Integration, Qualification)
ASPICE requires comprehensive verification activities:
- SWE.4 — Unit Verification (BP 2.1) — Test individual software units (functions, classes, modules) against SWE requirements. Methods: unit test, code review, static analysis.
- SWE.5 — Integration Test (BP 2.2) — Test module interactions and integrated subsystems. Methods: integration test, system simulation, HIL testing.
- SWE.6 — Qualification Test (BP 2.3) — End-to-end validation against system requirements. Methods: system testing, vehicle testing, field demonstration.
Each test must be linked to a requirement (via Test Group TG) and have documented acceptance criteria and results. For CL2+, traceability is mandatory: every requirement must have linked tests, and every test must trace to a requirement (GP 2.1.7).
GP 2.1.7 — Bidirectional Traceability (Mandatory for CL2+)
Generic Practice 2.1.7 is the most critical for ASPICE CL2+ assessment: bidirectional traceability. All items must be traceable:
- Forward traceability — SYS.1 → SYS.2 → SWE.1 → SWE.4–6 (tests)
- Backward traceability — Tests → SWE requirements → SYS requirements → Stakeholder needs
- No orphaned items — Every requirement has a parent and at least one child; every test links to a requirement
- Coverage — All stakeholder needs are addressed by at least one requirement; all requirements are verified by at least one test
RTMify's Trace feature validates this chain and flags missing links (MISSING_USER_NEED, NO_TEST_LINKED, ORPHAN_TEST). A clean trace report is mandatory evidence for CL2+ assessment.
GP 2.1.1 — Work Product Management and Approval
Generic Practice 2.1.1 requires all work products (requirements, designs, tests) to be reviewed and approved by authorized personnel before use. In RTMify, mark requirement status as "Approved" and include reviewer comments in Notes. For CL2+, all requirements must have Approved status; unapproved items indicate incomplete work product management and will result in lower capability rating.
GP 2.1.5 — Risk Management Linkage
Generic Practice 2.1.5 requires identifying risks to quality and linking mitigation measures (requirements, design decisions) to risks. Use the Risks tab to document identified risks, assess severity/likelihood, and link to mitigating requirements. Residual risk post-mitigation must be acceptable (low severity/low occurrence).
Step-by-Step Walkthrough
Capture Stakeholder Requirements (SYS.1)
Conduct systematic elicitation of stakeholder requirements from OEM specifications, regulatory standards, and market demands. ASPICE SYS.1 BP 1.1 requires documented evidence of elicitation methods and sources. Create User Needs (UN) for each unique stakeholder requirement.
- OEM Specifications (Lastenheft) — "The body control module shall support keyless entry within 2m range" (Requirement 3.2.1 of OEM Spec v2.1)
- Regulatory Standards — "The module shall meet OEM cybersecurity requirements per ISO 21434" (supplier technical agreement clause 5.3)
- Market & Customer Demand — "The BCM shall control interior lighting per OEM ambient lighting spec v3.2" (OEM feature requirement)
- System Constraints — "The BCM shall be flashable via OBD-II for dealer service updates" (OEM service requirement)
Use ID format UN-nnn. Include source reference (OEM doc, regulation, standard) in Source column. Assign priority: High for critical/safety functions, Medium for standard features, Low for nice-to-have.
| ID | Description | Source | Priority |
|---|---|---|---|
| UN-001 | The body control module shall support keyless entry within 2m range | OEM Specification (Lastenheft) | High |
| UN-002 | The BCM shall control interior lighting per OEM ambient lighting spec v3.2 | OEM Specification | Medium |
| UN-003 | The module shall meet OEM cybersecurity requirements per ISO 21434 | Regulation | High |
| UN-004 | The BCM shall be flashable via OBD-II for dealer service updates | OEM Specification | Medium |
Tips:
Every stakeholder requirement must have a source reference for traceability. Include OEM document name, clause number, and version. For regulatory requirements, cite the standard (ISO 21434, etc.). Each UN must trace forward to at least one SYS requirement, ensuring complete coverage. RTMify's Trace will flag any UN not linked to a SYS requirement as ORPHAN_USER_NEED. Conduct stakeholder interviews, review OEM specification documents, and maintain a documented elicitation log (SYS.1 BP 1.1 evidence) of requirements sources.
Define System and Software Requirements (SYS.2 and SWE.1)
Derive system requirements (SYS.2) from stakeholder needs by specifying measurable, testable system-level specifications that allocate functionality to software, hardware, and mechanical subsystems. Then derive software requirements (SWE.1) from system requirements by specifying what each software module must do. Establish bidirectional traceability: SYS.1 → SYS.2 → SWE.1.
- System Requirement ID (SYS-nnn) — System-level allocation of functionality to SW/HW/mechanical
- Software Requirement ID (SWE-nnn) — Software module implementation of SYS requirement
- Description — Measurable, testable specification (use SHALL for mandatory requirements)
- Traces — Parent UN (stakeholder need) for SYS; parent SYS (system requirement) for SWE
- Priority — High (safety/critical), Medium (standard), Low (optional)
- Test Group — Link to verification activities (TG-nnn) for SWE.4–6
- Status — Draft, In Review, Approved (CL2+ requires Approved status)
- Notes — Architectural allocation (e.g., "SWE-001 | Authentication Module"), design rationale, requirements category (SWE.1)
| ID | Description | Traces | Priority | Test Group | Status | Notes |
|---|---|---|---|---|---|---|
| SYS-001 | The BCM SHALL authenticate keyless entry fob within 200ms at ≤ 2m range using 125kHz/UHF challenge-response | UN-001 | High | TG-001 | Approved | SYS.2 system requirement |
| SWE-001 | The authentication software module SHALL complete challenge-response protocol within 150ms | SYS-001 | High | TG-002 | Approved | SWE.1 software requirement |
| SWE-002 | The lighting control module SHALL support 16.7 million color values (24-bit RGB) with fade transitions ≤ 500ms | UN-002 | Medium | TG-003 | Approved | SWE.1 software requirement |
| SWE-003 | The OBD-II flash module SHALL verify firmware signature per OEM PKI before installation | UN-004 | Medium | TG-004 | Approved | SWE.1 software requirement |
Tips:
Use SYS- prefix for system requirements and SWE- prefix for software requirements to distinguish allocation levels. For example, SYS-001 specifies the system-level behavior (keyless entry authentication within 200ms at 2m), while SWE-001 specifies the software module implementation (authentication protocol timing constraint). Every SWE requirement must trace to a parent SYS requirement (Traces column); every SYS requirement must trace to a UN. Include measurable parameters (timing: "150ms", range: "2m", accuracy: "±1 km/h"). Use SHALL for mandatory requirements, SHOULD for recommended, MAY for optional. Mark status as "Approved" only after review by product lead or systems engineer; unapproved requirements indicate incomplete SYS.2/SWE.1 practice and lower CL rating. For SYS.2 BP 1.2 (traceability) and SWE.1 BP 1.1 (derivation) assessment, ensure RTMify Trace shows 100% bidirectional coverage: no MISSING_USER_NEED, no ORPHAN_SYS, no ORPHAN_SWE. See Requirements for detailed guidance.
Plan Software Verification (SWE.4–SWE.6)
Define verification activities at three levels: SWE.4 unit verification (individual modules), SWE.5 integration test (module interactions), and SWE.6 qualification test (system end-to-end). Link each test to requirements via Test Group (TG). For CL2+, every requirement must have at least one linked test; every test must link to a requirement (GP 2.1.7 traceability). Include acceptance criteria and test method (Test, Analysis, Inspection, Demonstration).
- Test Group (TG-nnn) — Groups tests that verify a single requirement
- Test ID (T-nnn) — Individual test case identifier
- Type — Verification (SWE.4–6 test activity) or Validation (acceptance demonstration)
- Method — Test (functional/HIL/SIL/fault injection), Analysis (FMEA/FTA/code coverage), Inspection (review), Demonstration (real-world scenario)
- Description — Test objective, scenario, acceptance criteria (e.g., "Keyless entry range test — anechoic chamber 0.5m–3m; pass if authentication succeeds at all distances within spec")
| Test Group | Test ID | Type | Method | Description |
|---|---|---|---|---|
| TG-001 | T-001 | Verification | Test | Keyless entry range test — anechoic chamber 0.5m–3m |
| TG-001 | T-002 | Verification | Test | Authentication timing — 1000 challenge-response cycles |
| TG-002 | T-003 | Verification | Test | SW authentication protocol unit test — mock RF interface |
| TG-003 | T-004 | Verification | Test | LED color accuracy — spectrophotometer measurement |
| TG-003 | T-005 | Validation | Demonstration | Ambient lighting OEM sign-off — visual inspection per spec |
| TG-004 | T-006 | Verification | Test | OBD-II flash — valid/invalid signature acceptance/rejection |
Tips:
Create test entries for each verification level: SWE.4 unit tests (T-001, T-002 per module), SWE.5 integration tests (T-003, T-004), SWE.6 qualification/validation (T-005, T-006). One requirement may have multiple tests covering different aspects or verification methods. For example, TG-001 (SYS-001 keyless entry verification) includes T-001 (range test) and T-002 (timing test)—together they verify the system requirement at the integration level. Link tests to requirements in the Test Group column; RTMify Trace will validate the connection. Include test acceptance criteria in the Description (e.g., "pass if response time ≤ 150ms for 99% of cycles"). For CL2+ assessment, ensure all requirements have linked tests and tests have linked requirements; untraced tests indicate scope creep or incomplete verification planning. Include test results (pass/fail, code coverage, defects found) in your design history file; RTMify links to test evidence but does not store test results. See Tests & Verification for detailed verification method selection and planning guidance.
Document Risk Identification and Mitigation
Identify risks to quality and safe operation (e.g., "Relay attack on keyless entry — vehicle theft", "Malicious firmware flash — BCM compromise"). ASPICE GP 2.1.5 requires risk management linkage: risks identified, assessed for severity/likelihood, mitigated by requirements/design decisions, and residual risk tracked. Use the Risks tab to document and link mitigations.
- Risk ID (RSK-nnn) — Unique risk identifier
- Description — Clear description of the risk and potential impact (e.g., "Vehicle theft via relay attack on keyless entry")
- Severity / Occurrence — Assess on 1–5 scale: severity (impact if risk occurs), occurrence (likelihood)
- Mitigation — Design measure, requirement, or control that reduces risk (e.g., "UWB distance bounding + motion detection lockout")
- Linked Requirement — Requirement implementing the mitigation (e.g., SYS-001 or SWE-003)
- Residual Severity / Occurrence — Re-assessed severity/occurrence after mitigation; should be low (1–2)
| Risk ID | Description | Severity | Occurrence | Mitigation | Linked Req | Residual Severity | Residual Occurrence |
|---|---|---|---|---|---|---|---|
| RSK-101 | Relay attack on keyless entry — vehicle theft | 5 | 4 | UWB distance bounding + motion detection lockout | SYS-001 | 5 | 2 |
| RSK-102 | Flash update with malicious firmware — compromised BCM | 5 | 2 | PKI signature verification, secure boot chain | SWE-003 | 5 | 1 |
Tips:
Identify risks through FMEA, threat analysis (ISO 21434 TARA for cybersecurity), design review, and lessons learned. Include both safety risks (e.g., unintended acceleration) and quality risks (e.g., data corruption, communication timeout). Assess severity on impact scale: 5 = catastrophic (loss of life), 4 = critical (serious injury), 3 = major (moderate impact), 2 = minor, 1 = negligible. Assess occurrence on likelihood scale: 5 = frequent, 4 = probable, 3 = occasional, 2 = remote, 1 = extremely rare. Mitigation is implemented through requirements (SYS or SWE) and design decisions; link the specific requirement that mitigates each risk in the Linked Requirement column. Track residual risk post-mitigation; auditors expect risk reduction to acceptable levels (residual severity/occurrence both ≤ 2). Include cybersecurity risks (ISO 21434) with "TARA:" prefix if applicable. For SIL/ASIL projects (ISO 26262, IEC 62304), link risks to HARA hazard IDs. RTMify's Trace should show complete risk-to-requirement linkage: no unmitigated risks or unlinked requirements. See Risk Management for detailed FMEA and mitigation planning guidance.
Validate Bidirectional Traceability (GP 2.1.7)
Run RTMify Trace to validate bidirectional traceability and identify gaps. Generic Practice 2.1.7 (traceability) is mandatory for CL2+ assessment: every requirement must have a parent User Need and linked tests; every test must link to a requirement; no orphaned items. Trace also validates that all stakeholder needs are addressed by at least one requirement (coverage).
Use rtmify-trace --profile automotive your-workbook.xlsx for ASPICE assessments. The automotive profile keeps the baseline matrix checks and adds the allocation and automotive-chain checks that matter when an assessor drills into SYS/SWE trace continuity.
MISSING_USER_NEED— SYS/SWE requirement with no parent UN (traceability broken upward)NO_TEST_LINKED— Requirement with no Test Group (verification missing per SWE.4–6)ORPHAN_TEST— Test Group with no Requirement (unscoped test or obsolete)ORPHAN_USER_NEED— UN with no linked SYS/SWE requirement (design input not addressed)INCOMPLETE_RISK— Risk with no mitigation or residual risk unacceptableUNLINKED_REQUIREMENT_PAIR— SWE requirement with no parent SYS (allocation incomplete)
Fix all trace issues before design completion and CL assessment. A clean RTM (zero trace errors) is mandatory evidence for CL2+ and demonstrates compliance with GP 2.1.7.
Pro tip for ASPICE assessors:
Export your RTMify report (Trace summary + traceability matrix) as evidence of GP 2.1.7 implementation. Include a screenshot of the Trace dashboard showing zero errors and 100% coverage. Attach this to your ASPICE assessment submission. Auditors will verify that the report matches your current RTM and that approval status is "Approved" for all requirements (GP 2.1.1 work product management). If Trace reports errors, explain remediation steps in your assessment response. For CL2 assessment, traceability alone is sufficient; for CL3, add design review evidence (SWE.2/3 reviews) and change control records (SUP.10 process). See Status Codes for trace error definitions and remediation guidance.
What This Template Covers vs. Doesn't Cover
Covered by RTMify for ASPICE Assessment
- SYS.1 Stakeholder Requirements Elicitation — Systematic capture of OEM specifications, regulatory standards, and customer requirements as User Needs with source traceability
- SYS.2 System Requirements Definition (BP 1.2) — System-level requirement specification (SYS-nnn) derived from stakeholder needs, testable, and allocated to subsystems
- SWE.1 Software Requirements Derivation (BP 1.1) — Software-specific requirements (SWE-nnn) derived from system requirements with architectural allocation and design rationale
- SWE.4–SWE.6 Software Verification (BP 2.1–2.3) — Unit, integration, and qualification test specification linked to requirements with clear acceptance criteria
- Bidirectional Traceability (GP 2.1.7) — SYS.1 → SYS.2 → SWE.1 → SWE.4–6 traceability validation with gap analysis (Trace feature)
- Work Product Management (GP 2.1.1) — Requirement approval status tracking (Draft, In Review, Approved) for governance and review evidence
- Risk Management Linkage (GP 2.1.5) — Risk identification, severity/likelihood assessment, mitigation requirement linkage, and residual risk tracking
- Requirement Completeness & Coverage — RTMify Trace validates that all stakeholder needs are addressed by requirements and all requirements are verified by tests
NOT Covered (Separate ASPICE/ISO Process Documentation)
- SYS.1 Elicitation Evidence (Full Process Documentation) — RTMify captures elicited requirements but does not store the elicitation plan, interview notes, stakeholder list, or elicitation method documentation (SYS.1 BP 1.1 detailed evidence). These are maintained in your configuration management system or project documentation repository.
- SYS.2 Allocation and Architecture (System Design Specification) — RTMify indexes system requirements but does not contain detailed system architecture diagrams, module allocation tables, hardware-software interface specifications (SYS.2 detailed design). These are maintained in your system design documentation (CAD tools, design repositories).
- SWE.2 Software Architecture Design (Detailed Design Documents) — RTMify captures SWE requirements but does not maintain architecture diagrams, module interfaces, design patterns, or design review records (SWE.2 BP 2.1 design review evidence). Maintain architecture documentation separately and reference from RTMify Notes (e.g., "See Design Doc v2.3, section 3.2 for module interface").
- SWE.3 Detailed Design and Unit Construction (Code & Design Specs) — RTMify does not manage source code, unit-level design specifications, coding standards compliance, or code review records (SWE.3 BP 2.1). Maintain code and detailed design in your development environment (Git, design repositories) and reference from RTMify.
- Test Results and Evidence (SWE.4–6 Execution) — RTMify links requirements to tests but does not store test execution logs, test results, defect records, or code coverage metrics (SWE.4–6 BP 2.1–2.3 execution evidence). Maintain test results in your test management tool (TestRail, Azure DevOps) and reference pass/fail status from RTMify.
- Change Control and Problem Resolution (SUP.10, SUP.9) — RTMify does not manage change requests, impact analysis, problem reports, or corrective actions (SUP.9 / SUP.10 processes). Maintain change control records in your configuration management system (CM) and link from RTMify when requirements are modified.
- Configuration Management (SUP.8) — RTMify does not manage version control, baselines, or release management; this is handled by your CM tool (Git, Perforce). RTMify should be version-controlled as part of your design baseline.
- Project Management (MAN.3) — ASPICE project management process (planning, tracking, resource management, schedule) is assessed separately through project artifacts (schedules, resource plans, status reports). RTMify does not manage project administration.
- Supplier Management (SUP.1), Acquisition Management (MAN.4) — If using subcontractors or COTS components, supplier requirements and subcontractor assessment are managed separately per SUP.1. RTMify may include requirements for supplier interfaces but not supplier assessment evidence.
- Capability Level Scoring and Assessment Determination — RTMify provides evidence for BP and GP implementation but does not determine CL scores or assessment ratings. ASPICE certified assessors perform capability scoring; RTMify is input evidence to the assessment.